注:sql注入,对任何一个网站来说,都应该遇到过吧,反正早些年我们网站是经常遇到。
今天收集这样一段代码,供大家参考,希望可以帮助到大家。
--解决并清除SQL被注入<script>恶意病毒代码的语句 declare @t varchar(255),@c varchar(255) declare table_cursor cursor for select a.name,b.name from sysobjects a,syscolumns b ,systypes c where a.id=b.id and a.xtype='u' and c.name in ('char', 'nchar', 'nvarchar', 'varchar','text','ntext') declare @str varchar(500),@str2 varchar(500) set @str='<script src=http://r01.3322.org/c.js></script>'/*要替换的内容 实际应用中去掉*/ set @str2='' open table_cursor fetch next from table_cursor into @t,@c while(@@fetch_status=0) begin exec('update [' + @t + '] set [' + @c + ']=replace(cast([' + @c + '] as varchar(8000)),'''+@str+''','''+ @str2 +''')') fetch next from table_cursor into @t,@c end close table_cursor deallocate table_cursor; --sql 去掉字段html代码 dbo.StripAllTags(ProductDetails) CREATE FUNCTION [dbo].[StripAllTags] ( @input VARCHAR(8000) -- NVARCHAR(MAX)--2000内改为VARCHAR(8000) ) RETURNS NVARCHAR(MAX) AS BEGIN declare @Result nvarchar(MAX), @start int, @end int, @len int set @input = @input+'<>' set @Result = '' set @len=len(@input) set @start = charindex('<',@input,1) set @end = charindex('>',@input,@start) while(@start<@end) begin if(@start<>1) set @Result = @Result + substring(@input,1,@start-1) set @len = @len - @end set @input = substring(@input,@end+1,@len) set @start = charindex('<',@input,1) set @end = charindex('>',@input,@start) end RETURN replace(@Result,' ','') END
原文链接:http://www.cnblogs.com/zengxiangzhan/archive/2010/02/08/1665660.html